Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Password Manager 5.14.2 - Administration Guide (AD LDS Edition)

About Password Manager Getting Started Password Manager Architecture
Password Manager Components and Third-Party Solutions Typical Deployment Scenarios Password Manager in a perimeter network Management Policy Overview Password Policy Overview reCAPTCHA Overview User Enrollment Process Overview Questions and Answers Policy Overview Data Replication Phone-Based Authentication Service Overview Configuring Management Policy
Management Policies
Checklist: Configuring Password Manager Understanding Management Policies Adding or cloning a new Management Policy Configuring Access to the Administration Site Configuring Access to the Password Manager Self-Service Site Configuring Access to the Helpdesk Site Configuring Questions and Answers Policy Workflow overview Custom workflows Custom Activities Password Manager Self-Service Site workflows Helpdesk Workflows User Enforcement Rules
General Settings
General Settings Overview Search and Logon Options Import/Export Configuration Settings Outgoing Mail Servers Diagnostic Logging Scheduled Tasks Web Interface Customization Instance Reinitialization Realm Instances AD LDS Instance Connections Extensibility Features RADIUS Two-Factor Authentication Internal Feedback Customizing help link URL Password Manager components and third-party applications Unregistering users from Password Manager Bulk Force Password Reset Fido2 key management Working with Redistributable Secret Management account Email templates
Upgrading Password Manager Password Policies Enable 2FA for Administrators and Enable 2FA for HelpDesk Users Reporting Accounts Used in Password Manager for AD LDS Appendix B: Open Communication Ports for Password Manager for AD LDS Customization Options Overview Third-party contributions Glossary

Unregistering users from Password Manager

Using the unregister feature, users registered to the Password Manager can be removed. Note that the user is removed only from the Password Manager and not Active Directory.

To unregister a user from the Password Manager

  1. On the home page of the Administration Site, click General Settings > Unregister Users.

  2. On the Unregister Users page:

    • If you want to unregister individual users, expand the Select Users tree, click Add, manually search for the individual user, select the required user from the results, and click Save.

    • If you want to select a user group, expand the Select Groups tree, click Add, manually search for the individual groups, select the required group from the results, and click Save.

    • If you want to select the entire organization unit (OU), expand the Select Organizational Units tree, click Add, manually search for the individual OU, select the required OU from the results, and click Add.

  3. Click Unregister User to unregister the users.

NOTE:

  • To run the task at a specified time, select the Schedule at, specify a time to run the task, and click Save.

  • If a task to unregister an user is scheduled at a later time and you want to unregister the user at the current instance, click Remove Setting to delete the scheduled task settings and click Save.

  • If you have the Domain management account configured with a user other than the Active Directory Administrator then, make sure that the Write permissions are available to the storage attribute of the security questions (comment, by default) for all the users/ groups/OUs that is configured to be unregistered.

  • If the users/ groups/ OUs that needs to be unregistered are a member of Readers/ Administrators group in the ADLDS then, the Write Permissions are already inherited.

Bulk Force Password Reset

Use the Bulk Force Password Reset feature to force selected users, groups and Organizational Units to change their passwords.

To enforce a password change for users

  1. On the home page of the Administration site, click General Settings > Bulk Force Password Reset.

  2. On the Bulk Force Password Reset page:

    • If you want to enforce password change for individual users, expand the Select Users tree, click Add, manually search for the individual user, select the required user from the results, and click Save.

    • If you want to enforce password change for a user group, expand the Select Groups tree, click Add, manually search for the individual groups, select the required group from the results, and click Save.

    • If you want to enforce password change for the entire Organizational Unit (OU), expand the Select Organizational Units tree, click Add, manually search for the individual OU, select the required OU from the results, and click Save.

  3. Click Reset Passwords.

NOTE: Consider the following when using the Bulk Force Password Reset feature:

  • Password reset is achieved by setting the Users must change password at next logon flag of the selected user(s) to true. This flag cannot be set to true, if the Password never expires flag is also true.

  • If you have the Domain management account configured with a user other than the Active Directory Administrator, make sure that write permissions are given to the pwdlastset attribute.

Fido2 key management

Use the Fido2 key management feature to unpair FIDO2 keys from selected users, groups and Organizational Units.

TO unpair Fido2 keys

  1. On the home page of the Administration Site, navigate to General Settings > Fido2 key management.

  2. On the Fido2 key management page:

    • If you want to unpair Fido2 keys from individual users, expand the Select Users tree, click Add, manually search for the individual user, select the required user from the results, and click Save.

    • If you want to unpair Fido2 keys from a user group, expand the Select Groups tree, click Add, manually search for the individual groups, select the required group from the results, and click Save.

    • If you want to unpair Fido2 keys from the entire Organizational Unit (OU), expand the Select Organizational Units tree, click Add, manually search for the individual OU, select the required OU from the results, and click Save.

  3. Click Delete Fido2 Key(s).

Working with Redistributable Secret Management account

Redistributable Secret Management Service (rSMS) is used to manage users password across multiple connected systems. Using rSMS service you can synchronize the passwords across connected systems. The rSMS service is installed with the Password Manager software.

An rSMS account must be created and configured to interact with the rSMS service to execute password change functionality on connected systems. After creating the rSMS account and configuring certificate binding settings (optional), you can configure the settings to reset the password in connected systems.

To create rSMS account and configure certificate binding settings

  1. On the home page of the Administration Site, click General Settings.

  2. Click the rSMS Settings tab from the options.

    The Redistributable Secret Management Service page is displayed.

    NOTE: An rSMS account must be created before working with rSMS activity. An rSMS user is automatically created if the imported configuration file has the rSMS account details.

  3. In the Create Account section, click Create Account to create an rSMS account.

  4. In the Certificate binding section, select a custom certificate from the drop-down list, if available. By default, the built-in certificate is used.

    NOTE: If you import a configuration file, the rSMS certificate binding details are not imported. The default binding settings or the certificate binding settings of the system is used.

  5. Select the IP address from the rSMS IP address drop-down list.

    NOTE: For built-in certificates, the Port number field is automatically populated with the value 20001. For custom certificates, custom port number can be provided.

  6. Click Save Settings to save the certificate binding settings.

    NOTE:

    • By default, all Password Manager logs are available in C:\Windows\TEMP folder. If the default Password Manager log path is changed during an update, rSMS automatically uses the updated log path instead of the default path used earlier.

    • Additional rSMS logs are available in the rSMS.Service-{Date}.log file. Enable Password Manager logging from the Administrator site under General Settings > Logging Settings.

Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation